Experts Available Now Call (888) 752-7542

Search
Close this search box.

Experts Available Now

Call (888) 752-7542

CompTia® Security + Instructor-led Training 5 Days (with Exam)

OVERVIEW:

CompTIA® Security+® (Exam SY0-401) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.

This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-401) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today’s job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.

[ucaddon_uc_super_clean_tabs heading_active=”#ec1f35″ uc_items_data=”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” uc_fonts_data=”JTdCJTIydWNfaXRlbXNfYXR0cmlidXRlX3RpdGxlJTIyJTNBJTdCJTIyZm9udC1mYW1pbHklMjIlM0ElMjJNb250c2VycmF0JTIyJTJDJTIyZm9udC13ZWlnaHQlMjIlM0ElMjJCb2xkJTIyJTJDJTIyZm9udC1zaXplJTIyJTNBJTIyMjBweCUyMiU3RCUyQyUyMnVjX2l0ZW1zX2F0dHJpYnV0ZV9jb250ZW50JTIyJTNBJTdCJTIyZm9udC1mYW1pbHklMjIlM0ElMjJMYXRvJTIyJTJDJTIyZm9udC13ZWlnaHQlMjIlM0ElMjJOb3JtYWwlMjIlMkMlMjJmb250LXNpemUlMjIlM0ElMjIxNXB4JTIyJTJDJTIybGluZS1oZWlnaHQlMjIlM0ElMjIxZW0lMjIlMkMlMjJjb2xvciUyMiUzQSUyMiUyMzYyNjI2MiUyMiU3RCU3RA==”]

Course Outline

Lesson 1: Security Fundamentals
  • Topic A: The Information Security Cycle
  • Topic B: Information Security Controls
  • Topic C: Authentication Methods
  • Topic D: Cryptography Fundamentals
  • Topic E: Security Policy Fundamentals
Lesson 2: Identifying Security Threats and Vulnerabilities
  • Topic A: Social Engineering
  • Topic B: Malware
  • Topic C: Software-Based Threats
  • Topic D: Network-Based Threats
  • Topic E: Wireless Threats and Vulnerabilities
  • Topic F: Physical Threats and Vulnerabilities
Lesson 3: Managing Data, Application, and Host Security
  • Topic A: Manage Data Security
  • Topic B: Manage Application Security
  • Topic C: Manage Device and Host Security
  • Topic D: Manage Mobile Security
Lesson 4: Implementing Network Security
  • Topic A: Configure Security Parameters on Network Devices and Technologies
  • Topic B: Network Design Elements and Components
  • Topic C: Implement Networking Protocols and Services
  • Topic D: Apply Secure Network Administration Principles
  • Topic E: Secure Wireless Traffic
Lesson 5: Implementing Access Control, Authentication, and Account Management
  • Topic A: Access Control and Authentication Services
  • Topic B: Implement Account Management Security Controls
Lesson 6: Managing Certificates
  • Topic A: Install a CA Hierarchy
  • Topic B: Enroll Certificates
  • Topic C: Secure Network Traffic by Using Certificates
  • Topic D: Renew Certificates
  • Topic E: Back Up and Restore Certificates and Private Keys
  • Topic F: Revoke Certificates
Lesson 7: Implementing Compliance and Operational Security
  • Topic A: Physical Security
  • Topic B: Legal Compliance
  • Topic C: Security Awareness and Training
  • Topic D: Integrate Systems and Data with Third Parties
Lesson 8: Risk Management
  • Topic A: Risk Analysis
  • Topic B: Implement Vulnerability Assessment Tools and Techniques
  • Topic C: Scan for Vulnerabilities
  • Topic D: Mitigation and Deterrent Techniques
Lesson 9: Troubleshooting and Managing Security Incidents
  • Topic A: Respond to Security Incidents
  • Topic B: Recover from a Security Incident
Lesson 10: Business Continuity and Disaster Recovery Planning
  • Topic A: Business Continuity
  • Topic B: Plan for Disaster Recovery
  • Topic C: Execute DRPs and Procedures

Appendix A: Mapping Course Content to CompTIA® Security+® Exam SY0-401